Publisher
Springer Nature Switzerland
Reference39 articles.
1. Armknecht, F., Barman, L., Bohli, J.M., Karame, G.O.: Mirror: enabling proofs of data replication and retrievability in the cloud. In: Holz, T., Savage, S. (eds.) USENIX Security Symposium 2016, pp. 1051–1068. USENIX Association (2016)
2. Armknecht, F., Bohli, J.M., Karame, G.O., Liu, Z., Reuter, C.A.: Outsourced proofs of retrievability. In: Ahn, G., Yung, M., Li, N. (eds.) CCS 2014, pp. 831–843. ACM (2014)
3. Ateniese, G., et al.: Provable data possession at untrusted stores. In: Ning, P., di Vimercati, S.D.C., Syverson, P.F. (eds.) CCS 2007, pp. 598–609. ACM (2007)
4. Ateniese, G., Di Pietro, R., Mancini, L.V., Tsudik, G.: Scalable and efficient provable data possession. In: Levi, A., Liu, P., Molva, R. (eds.) SecureComm 2008, pp. 1–10. ACM (2008)
5. Lecture Notes in Computer Science;M Azraoui,2014
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献